Features of Entitlement Microservices

This section lists the features that the Entitlement Microservices provides.

Resource Attribute Based Filters

Apart from resource ID, attribute-based filters in Entitlement configurations to filter the records based on the access control defined using authorization policies.

The resource filter fields can be configured in the Microservice. There are two configuration files to configure the resource filter fields.

Data Ingestion

This section explains the approach used for data ingestion component to upload user entitlements from Temenos Transact product system.

The following screen capture explains the various services and routines used to produce data events for all existing external users from Temenos Transact.

Where,

1 - Get list of users

2 - For each user,

      a - Invoke TCUA routine to get the entitled account

      b - Invoke Traceability Component service with the accounts data

      c - If Exit Hook configured for Component service will data events

3 - If event is designed as data events to emit event data as DES events

Checking Use Cases of Data Ingestion

The following are the prerequisites for checking the use cases of data ingestion:

  • Application server must be up and running with the following deployments and database should be connected.

    https://confluence.temenos.com/download/attachments/29099347/image2020-2-4_17-12-49.png?version=1&modificationDate=1580906590378&api=v2

  • DES must be configured and in running status.
  • In tafj.properties, you should change the configuration for temn.tafj.runtime.use.df.cache to true. [To enable commit capture to store the EVENTS in F_DATA_EVENT table]

Authorization

Microservices use XACML-based authorization policies to enforce authorization checks for both events and API requests serviced in the microservice.

Microservice framework provides required Information (PIP)  to the XACML Execution engine (PEP) in order to execute the role-based authorization policies in the microservices.  Based on the results returned from the PEP engine, the Microservice framework allows or denies the execution of API as well configured queries of the microservices. 

S.No

Inputs 

Description

1

User Id 

'subject' claims of JWT Token received 

2

User Entitlements

Configured in Entitlement Microservices for all the users

3

Request Input parameters 

Request  Input paramters

XACML Based Authorization

Attribute-based access policy is verified at the MS API endpoint before business operations are performed. The rule-based policy files are stored in the GenericConfig Microservice. The policy is evaluated in two layers. Authorization checks are enforced at two points - API and Query Execution Layer.

  • API Layer - Microservice framework shares information of the user entitlement details, request details, user context and environment context to the PDP engine that executes the policies and provides the result as Allow or Deny.
  • DAO Layer - Microservice framework restricts access to the records by defining entity attributes-based policy using OBLIGATIONS at the XACML policies.

Temenos Microservice provides a provision to create policies for the microservices. The rule-based policy file can be created using PAPUI. 

Microservice Framework uses the Temenos security framework library to apply Attribute-based Access policies check at MS API endpoint (GET/POST/PUT) before the business function gets executed.  The XACML Policies are available in the runtime and get enforced before APIs getting executed in the Microservice.  

Following are the XACML attribute types used to enforce policy-based authorization checks in the Microservice

Apart from the API layer, Microservice Framework provides an infrastructure to apply the Record Level Access check at the query execution layer of the Microservices. You can restrict access to the records by defining entity attributes based policy using  OBLIGATIONS at the XACML policies. 

Policy Decision Policy (PDP) Engine provides infrastructure to evaluate applicable policy and returns an authorization decision to the application to enforce the decision at right enforcement point. 

AuthzForce (OW2) is used as PDP engine for out of the box support. An adapter, available for AuthzForce, is used for implementing policies in Microservices.

Apart from the adaptor, below components’ generic implementations are provided as a part of common library

  • Information Point
  • Decision Point & Obligations

Copyright © 2020- Temenos Headquarters SA

Published on :
Wednesday, October 12, 2022 7:06:03 PM IST

Feedback
x